发明名称 Calculating state of cryptographic objects and generating search filter for querying cryptographic objects
摘要 Mechanisms are provided for calculating state of cryptographic objects and generating search filters for querying cryptographic objects based on the given state or on the given combination of unique states. The mechanism to calculate a state of a cryptographic object allows an application or system to resolve the current state of any cryptographic object with the following set of state altering date values: initial date, activation date, deactivation date, compromise date, and destroy date. A processing module may retrieve the state meta-data and calculate the current state of a given cryptographic object. The current state may be, for example, one of the following: unknown, pre-active, active, deactivated, compromised, destroyed, and destroyed-compromised. The mechanism to generate a search filter may generate a search query language (SQL) search filter to query for cryptographic objects using the state altering date values stored for each object.
申请公布号 US9298767(B1) 申请公布日期 2016.03.29
申请号 US201414294257 申请日期 2014.06.03
申请人 International Business Machines Corporation 发明人 Braksator Mark J.;Rich Bruce A.
分类号 G06F17/30;G06F21/62 主分类号 G06F17/30
代理机构 代理人 Tkacs Stephen R.;Walder, Jr. Stephen J.;Kalaitzis Parashos
主权项 1. A method, in a data processing system, for managing cryptographic keys, the method comprising: storing a set of state altering date values in state meta-data of each cryptographic key in a data store, wherein the set of state altering date values comprises an initial date, an activation date, and a deactivation date; retrieving the set of state altering date values from the data store for a given cryptographic key; and determining a state of the given cryptographic key based on a combination of the set of state altering date values, wherein the set of state altering date values further comprises a compromise date and a destroy date, wherein determining the state of the given cryptographic key comprises: responsive to the destroy date being set and the compromise date not being set, determining that the given cryptographic key is in a destroyed state; and responsive to the destroy date not being set and the compromise date being set, determining that the given cryptographic key is in a compromised state.
地址 Armonk NY US